Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Hamed Arshad"'
An Analysis on the Position of Urban Good Governance and Strategic Planning Case study: Zahedan City
Publikováno v:
جغرافیا و توسعه, Vol 14, Iss 42, Pp 63-82 (2016)
The experience of centralized countries showed that one-side and subject view looking at the city will cause great problems. Removing such problems is possible through public supervision (responsiveness), collaborative action and promoting the effici
Externí odkaz:
https://doaj.org/article/1afd07d84d044e8c8a02022955fba8e8
Publikováno v:
Information Sciences. 616:558-576
Publikováno v:
Journal of Cryptographic Engineering.
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-
Publikováno v:
Formal Techniques for Distributed Objects, Components, and Systems ISBN: 9783031086786
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b2377715e2c2127b6b572b8741d426e
https://doi.org/10.1007/978-3-031-08679-3_2
https://doi.org/10.1007/978-3-031-08679-3_2
Publikováno v:
Future Generation Computer Systems. 100:882-892
Wireless sensor networks (WSNs) can be deployed in any unattended environment. With new enhancements in internet of things (IoT) technology, authorized users are able to access reliable sensor nodes. By accessing the sensor nodes, they can obtain dat
Publikováno v:
Journal of Systems Architecture. 129:102625
Publikováno v:
Wireless Personal Communications. 97:2145-2166
The Session Initiation Protocol (SIP) provides a way to control the wired and wireless Voice over Internet Protocol-based communication over an insecure channel. The SIP protocol is not secure due to relying on an intrinsically open text-based commun
Publikováno v:
Future Generation Computer Systems. 63:56-75
Spread of wireless network technology has opened new doors to utilize sensor technology in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for among the service seeker users, sensing component sensor nodes (SNs) and t
Publikováno v:
Multimedia Tools and Applications. 76:13401-13423
Nowadays with widespread employment of the Internet, servers provide various services for legal users. The vital issue in client/server connections is authentication protocols that make the communication channel safe and secure against famous attacks